Daeseon Choi

Orcid: 0000-0002-1438-0265

According to our database1, Daeseon Choi authored at least 44 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Detection of adversarial attacks based on differences in image entropy.
Int. J. Inf. Sec., February, 2024

2023
A hybrid adversarial training for deep learning model and denoising network resistant to adversarial examples.
Appl. Intell., April, 2023

A Study on the Interoperability Technology of Digital Identification Based on WACI Protocol with Multiparty Distributed Signature.
Sensors, 2023

Systematic Evaluation of Robustness Against Model Inversion Attacks on Split Learning.
Proceedings of the Information Security Applications - 24th International Conference, 2023

2022
Feature-Based Adversarial Training for Deep Learning Models Resistant to Transferable Adversarial Examples.
IEICE Trans. Inf. Syst., 2022

Extracting a Minimal Trigger for an Efficient Backdoor Poisoning Attack Using the Activation Values of a Deep Neural Network.
Proceedings of the WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, 2022

2021
Classification score approach for detecting adversarial example in deep neural network.
Multim. Tools Appl., 2021

Data Correction For Enhancing Classification Accuracy By Unknown Deep Neural Network Classifiers.
KSII Trans. Internet Inf. Syst., 2021

Adversarial attacks by attaching noise markers on the face against deep face recognition.
J. Inf. Secur. Appl., 2021

Adversarial Attack Based on Perturbation of Contour Region to Evade Steganalysis-Based Detection.
IEEE Access, 2021

2020
Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System.
IEEE Trans. Inf. Forensics Secur., 2020

2019
UAV-Undertaker: Securely Verifiable Remote Erasure Scheme with a Countdown-Concept for UAV via Randomized Data Synchronization.
Wirel. Commun. Mob. Comput., 2019

Restricted Evasion Attack: Generation of Restricted-Area Adversarial Example.
IEEE Access, 2019

Selective Untargeted Evasion Attack: An Adversarial Example That Will Not Be Classified as Certain Avoided Classes.
IEEE Access, 2019

Priority Adversarial Example in Evasion Attack on Multiple Deep Neural Networks.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2019

2018
Random Untargeted Adversarial Example on Deep Neural Network.
Symmetry, 2018

Estimating Resident Registration Numbers of Individuals in Korea: Revisited.
KSII Trans. Internet Inf. Syst., 2018

Hidden Singer: Distinguishing Imitation Singers Based on Training with Only the Original Song.
IEICE Trans. Inf. Syst., 2018

CAPTCHA Image Generation Systems Using Generative Adversarial Networks.
IEICE Trans. Inf. Syst., 2018

Advanced Ensemble Adversarial Example on Unknown Deep Neural Network Classifiers.
IEICE Trans. Inf. Syst., 2018

Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier.
Comput. Secur., 2018

Multi-Targeted Adversarial Example in Evasion Attack on Deep Neural Network.
IEEE Access, 2018

Eavesdropping of Magnetic Secure Transmission Signals and Its Security Implications for a Mobile Payment Protocol.
IEEE Access, 2018

One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural Networks.
Proceedings of the Information Security Applications - 19th International Conference, 2018

Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

POSTER: Address Authentication Based on Location History.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

POSTER: Zero-Day Evasion Attack Analysis on Race between Attack and Defense.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Applying Time-Lapse Concepts onto Storage System for Long-Term System Trace Analysis: Technical Challenges and Blueprints.
Proceedings of the First IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2018

2017
Simplified small exponent test for batch verification.
Theor. Comput. Sci., 2017

Private attribute inference from Facebook's public text metadata: a case study of Korean users.
Ind. Manag. Data Syst., 2017

Detecting Online Game Chargeback Fraud Based on Transaction Sequence Modeling Using Recurrent Neural Network.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Friend-Safe Adversarial Examples in an Evasion Attack on a Deep Neural Network.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

2016
Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

2015
Customer Data Scanner for Hands-Free Mobile Payment.
IEICE Trans. Commun., 2015

Estimating Korean Residence Registration Numbers from Public Information on SNS.
IEICE Trans. Commun., 2015

Effects of Contextual Properties on Users' Privacy Preferences in Mobile Computing Environments.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

Accurate Indoor Proximity Zone Detection Based on Time Window and Frequency with Bluetooth Low Energy.
Proceedings of the 10th International Conference on Future Networks and Communications (FNC 2015) / The 12th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2015) / Affiliated Workshops, 2015

2013
Geo-location based QR-Code authentication scheme to defeat active real-time phishing attack.
Proceedings of the DIM'13, 2013

2010
Gatekeeper: providing secure interoperability between mobile web-browser and local resources.
Proceedings of the 6th Workshop on Digital Identity Management, 2010

2009
Digital ID Wallet: Provide Selective Disclosure and Users Control of Identity Information.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks.
IEICE Trans. Commun., 2008

2003
A Location Privacy Protection Mechanism for Smart Space.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

New Security Paradigm for Application Security Infrastructure.
Proceedings of the Information Networking, 2003


  Loading...